Cyber Security Glossary
A complete glossary of essential Cyber Security terms.
Search: (clear)
- Acceptable Use PolicyAcceptable Use Policy is a policy that defines the level of access and degree of use of the organization’s network or internet by the members of an organization.
- Access Control ListAccess Control List or ACL filter network traffic by controlling whether it's allowed or blocked.
- Access PathAn Access Path is a logical order that directs to the location on the computer where an object such as webpage, file etc., is stored.
- Access PointAn access point is a computer networking device which allows a Wi-Fi compliant device to connect to a wired network and usually connects via a router
- Access ProfileAn access profile is information about a user that is stored on a computer, including their password and name as well as what they are allowed access to.
- Access RightsAccess rights are the privileges or permissions awarded to a user or a program to access or alter, edit, delete the files stored on a network.
- Access TypeAccess type is applied to an entity class, mapped superclass or embeddable class and is used to specify attributes
- AccountabilityAccountability is the ability to trace an action performed on the system to a user, a process or an application.
- Accounting Legend CodeAccounting legend code is numeric code used to indicate the minimum accounting controls required for items accountable communications security (COMSEC) material within the control systems
- ACLAccess Control List or ACL filter network traffic by controlling whether it's allowed or blocked.
- Active Security TestingActive security testing is security testing which involves directly interacting with a target, such as sending packets
- Ad Hoc NetworkAn ad hoc network is a local area network (LAN) that spontaneously builds as devices connect. An ad hoc network does not rely on a base station to coordinate different points, rather the individual base nodes forward packets to and from each other.
- Address Resolution ProtocolAddress Resolution Protocol (ARP) is used for discovering a physical machine (MAC) address and associating it to the Internet Protocol (IP) address.
- Administrative SafeguardsAdministrative safeguards are a special set of the HIPPA security rules. Administrative safeguards focus on internal organization, policies and procedures and the maintenance of security managers which are in place to protect sensitive patient information.
- Advanced Encryption StandardThe Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
- Advanced Penetration TestingAdvanced penetration testing is the process of testing a network to discover vulnerabilities which make it open to harmful intruders; then addressing and remedying the issues.
- Advanced Persistent ThreatAn advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
- AdversaryAn Adversary is a process, user or device that possesses a threat to the network.
- AdwareAdware is type software that automatically displays or downloads unwanted advertising material.
- AESThe Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.
- Air GapAir Gap is a network security measure to ensure that a secure computer network is physically isolated from unsecured networks.
- Alert SituationAn alert situation is when the interruption in an enterprise is not resolved even after the competition of the threshold stage, an alert situation requires the enterprise to start escalation procedure.
- Alternate FacilitiesAlternate facilities are secondary facilities includes Offices, data processing centers etc., from where high- priority emergency tasks can be performed, delivered when primary facilities are interrupted, unavailable
- Alternate ProcessAn alternate process is a back-up process devised to help continue business critical process without any interruption, from the time the primary enterprise system breaks down to the time of its restoration
- AnalogAnalog is a transmission signal denoted by ‘Sine Way,’ that varies in signal strength (Amplitude) or Frequency (time). While the higher and lower points of the wave denotes the value of signal strength, on the other hand the physical length of the wave indicates the value of time.
- Anonymizing ProxyAnonymizing proxies allow the user to hide their web browsing activity. They are often used to bypass web security filters—e.g., to access blocked sites from a work computer.
- Anti-SpamAnti-spam programs can detect unwanted email and prevent it from reaching user inboxes.
- Anti-SpywareAnti-spyware is a type of software that is designed to detect and remove unwanted spyware programs.
- Anti Virus SoftwareAntivirus software is a program or a set of programs that help prevent any malicious object, code, program from entering your computer or network. If any such malicious programs enters your computer, Antivirus software helps detect, quarantine, or remove such programs from the computer or networks
- AntivirusAntivirus is software that is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more.
- App AttackAn app attack occurs when a user unknowingly installs a harmful app on their tablet or smartphone and the app in turn steals their personal data.
- AppliancesAppliances are a combination of hardware and software security elements in one solution. This lets you plug appliances in rather than installing the software separately
- Application ControlApplication control allows you to control the use of applications that may be inappropriate for use on business computers or networks
- Application LayerAn Application Layer is one of the seven layers in the Open-System Interconnection (OSI) Model of the TCP/IP protocol Suite. Application Layer defines the way process-to-process communication happens in a network; it only offers a strong communication interface and end user services.
- APTAn advanced persistent threat (APT) is a network attack in which an unauthorized person gains access to a network and stays there undetected for a long period of time.
- ArchitectureArchitecture is a structure that defines or describes the very fundamentals of a system or an organization, its components, the relationship between each of these components, their relationship to the overall system, and finally, their effectiveness in guiding the system towards its goals.
- ARPAddress Resolution Protocol (ARP) is used for discovering a physical machine (MAC) address and associating it to the Internet Protocol (IP) address.
- Asymmetric Key (Public Key)An Asymmetric Key (public key) is a security measure that uses two keys to ensure the confidentiality of a message. One key encrypts the message, while the other key decrypts it.
- AttackAn attack is an action with malicious intention to interrupt the operations of a network or steal the data, etc
- Attack MechanismAn Attack Mechanism is a system or strategy by which a target is hit; the attacker may use different attack mechanisms such as a container or payload to hit the intended target.
- Attack VectorAn Attack Vector is a means and ways by which attacker gains entry into the target system. Attackers mainly use the human element or the weak links to gain such access.
- AttenuationAttenuation is the weakening of signal strength, analog or digital, especially when transmitted over long distances.
- Audit TrailAn audit trail is a detailed history of transactions to help you trace a piece of information back to its origin. In the field of computers, Audit trail or paper log, helps maintain security, recover any lost data
- AuthenticationAuthentication is the process of identifying a piece of information, the veracity of information provided. In computers, it is the process of identifying a person or system with the username; password, etc. Authentication helps individuals; systems gain authorization based on their identity.
- AuthenticityAuthenticity is the proof or validity that a claimed identity (whether human or a resource) is real and legitimate.
- Autorun WormAutorun worms are malicious programs that take advantage of the Windows AutoRun feature. They execute automatically when the device on which they are stored is plugged into a computer.
- AvailabilityAvailability is the time duration a system or resource is ready for use.
- BackdoorA backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system.
- Backdoor TrojanA backdoor Trojan allows someone to take control of a user’s computer without their permission.
- BackupA backup refers to the archiving data so it may be used to restore the original after a data loss event.
- BandwidthBandwidth is the capacity of a communication channel to pass data through in a given amount of time.
- BannerA banner is a display on an information system that sets the parameters for system or data use.
- Banner GrabbingBanner grabbing is the process of grabbing banner information such as the application type and version. This information is then transmitted by a remote port when a connection is initiated.
- BaselineA security baseline defines a set of basic security objectives which must be met by any given service or system.